Ask a question from expert

Ask now

Data And Security Article 2022

Data Retention and Security

7 Pages1100 Words25 Views
   

Added on  2022-09-18

Data And Security Article 2022

Data Retention and Security

   Added on 2022-09-18

BookmarkShareRelated Documents
Running head: DATA AND SECURITY
DATA AND SECURITY
Name of the Student
Name of the University
Author Note:
Data And Security Article 2022_1
DATA AND SECURITY1
Table of Contents
Summary of Article.............................................................................................................2
Why the Topic is Controversial?.........................................................................................2
What are some diverse view?..............................................................................................3
What are reasons for Stakeholders for expressing their views?..........................................3
Role of Engineers................................................................................................................3
Discussion on similar Topic and changes over time...........................................................4
References............................................................................................................................5
Data And Security Article 2022_2
DATA AND SECURITY2
Summary of Article
In the last few months, Australian civil rights have faced attack. In the month April, the
data retention law of government has come into the picture. Under this law, telecommunication
organization require the organization to have the meta-data for last two-years. Meta-data is
collected from phone calls, messages, mail and activity on the internet platform. It is completely
traced by the government and is accessible by different agencies (Anon 2019). This particular
law come into picture only few weeks prior to Australia marked its privacy awareness week.
Law for data retention is found to be as one of the comprehensive and data collection in the
western world. This particular law highlights the democratic principle on which Australia is
based. The Privacy principle of Australia aims to define the personal information which is
permissible in nature. The second thing which should be considered is that metadata which is
data about data that provides description about the daily activities and movements. This
particular law is justified for the need of protecting Australian from any kind of terrorist attack.
There is a range of widely-accessible technologies for achieving the overall objective. VPN
stands for virtual private network generally hides all the browsing data and information from
different internet service providers. On April 13, the data retention law comes into action which
is often known as VPN day (Brevini 2017). Onion router is known to be free software which is
needed for protecting the anonymity of different users. It is all about concealing the internet
activity for surveillance and analysis. There is certain number application like signal and
Telegram which aims to provide data encryption solution.
Data And Security Article 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
LAW, GOVERNMENT AND POLICY.
|12
|2499
|22

Cyber Intelligence Sharing and Protection Act
|6
|1944
|44

Law, Government & Justice Student's Name 1/30/2019 Law, Government & Justice Student's Name
|12
|2575
|337

Report on Information Technology Profession and Ethics
|8
|2113
|400

Espionage and Intelligence & Cyber Attacks
|12
|3427
|68

Ethical and Legal Issues in Web Technology
|7
|1324
|424